BLE Vulnerability Taxonomy
Kategorien
| Kategorie | Beschreibung | CWE |
|---|---|---|
| No Auth | Fehlende Authentifizierung | CWE-287 |
| Weak Crypto | Schwache Verschlüsselung | CWE-327 |
| Hardcoded Keys | Eingebettete Schlüssel | CWE-798 |
| Replay | Replay-Anfälligkeit | CWE-294 |
| Privacy Leak | Datenleck im Advertising | CWE-359 |